Search Results for sonar tcp trojan

IT threat evolution Q3 2016. Statistics

...obtain root access to a device. With root access, this Trojan protects itself from being deleted, and it can also steal saved passwords from browsers. But perhaps the most notable...more…

IT threat evolution in Q1 2016

...quarter of 2016, there were several incidents of hospital networks being infected with various types of Trojan ransomware that encrypts data and demands a ransom to decrypt it. The latest...more…

IT threat evolution in Q2 2016. Statistics

...we detected more than 50,000 installation packages related to this Trojan. TOP 20 mobile malware programs Please note that this ranking of malicious programs does not include potentially dangerous or...more…

IT threat evolution Q1 2017. Statistics

...13 times from the previous quarter. Despite this Trojan being known to us since June 2016, such an explosive increase in the number of attacks has only occurred now. This...more…

Mobile malware evolution 2015

...program are Trojan Trojan-SMS.AndroidOS.OpFake.cc and the representatives of the Trojan-Banker.AndroidOS.Acecard family. One of the OpFake.cc modifications can imitate the interface of more than 100 legitimate banking and finance apps. The...more…

Mobile malware evolution 2016

...modular trojan Backdoor.AndroidOS.Triada, which modified the Zygote processes. This allowed it to remain in the system and alter text messages sent by other apps, making it possible to steal money...more…

Attack on Zygote: a new twist in the evolution of mobile threats

...products The owners of the Trojans described above, such as Leech, Ztorg, Gorpo (as well as the new malware family Trojan.AndroidOS.Iop) are working together. Devices infected by these malicious programs...more…

Gugi: from an SMS Trojan to a Mobile-Banking Trojan

...Gugi mobile-banking Trojan family in more detail. The use of WebSocket by Gugi The mobile-banking Trojan family, Trojan-Banker.AndroidOS.Gugi is interesting due to its use of the WebSocket protocol to interact...more…

The Evolution of Acecard

...Trojan attacks in Australia. After analyzing all the known malware modifications in this family, we established that they attack a large number of different applications. In particular, the targets include...more…

KSN Report: Mobile ransomware in 2014-2016

...infamous Acecard banking Trojan. In 2014-2015 it secured a fairly visible share of the pie of mobile users attacked with ransomware, but by 2015-2016 it had disappeared from the top,...more…

Locky: the encryptor taking the world by storm

...In February 2016, the Internet was shaken by an epidemic caused by the new ransomware Trojan Locky (detected by Kaspersky Lab products as Trojan-Ransom.Win32.Locky). The Trojan has been...more…

Lurk Banker Trojan: Exclusively for Russia

...rather prominent banker Trojan – Lurk – that is the subject of this paper has been used to steal money from Russian residents for several years. We have written about...more…

Petya: the two-in-one trojan

...from the MBR, they usually didn’t encrypt any data on the disk. Today, we have encountered a new threat that’s a blast from the past. The Petya Trojan (detected by...more…

Ztorg: money for infecting your smartphone

...detected the malware as Trojan.AndroidOS.Ztorg.ad. After some searching, I found some other similar infected apps that were being distributed from the Google Play Store. The first of them, called Privacy...more…

Banking Trojan, Gugi, evolves to bypass Android 6 protection

...a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added in Android 6: permission-based app overlays and a dynamic permission requirement for dangerous...more…

A malicious pairing of cryptor and stealer

...tack. The Trojan is delivered in emails that mostly target corporate users. After a successful infection, RAA executes its main task, i.e. encrypts the user’s files. However, it doesn’t stop...more…

About site

This is experimental project, which search automatically antivirus, security, malware, etc. news and alerts. If you want add/delete source or post, let us know. We will add/delete it. We'd like make place, where you can find security information from various sources with correct backlink back to source.